pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

HDCP Technology

High-Bandwidth Digital Content Protection is effectively a copy protection scheme designed to eliminate the possibility of intercepting digital data midstream between the source to the display. Using hardware on both the graphics adapter card and the monitor, HDCP will encrypt data on the PC before sending it to the display device, where it will be decrypted. HDCP-equipped DVI cards will be able to determine whether or not the display device it is connected to is also has HDCP features. If not, the card will still be able to protect the content being displayed – by slightly lowering the image quality!

An HDCP system comprises three elements, each of which plays a specific role in affording content protection. First, there is the authentication protocol, through which the HDCP Transmitter verifies that a given HDCP Receiver is licensed to receive HDCP Content. With the legitimacy of the HDCP Receiver determined, encrypted HDCP Content is transmitted between the two devices based on encryption keys established during the authentication protocol. This prevents eavesdropping devices from utilising the content. Finally, in the event that legitimate devices are compromised to permit unauthorised use of HDCP Content, renewability allows a HDCP Transmitter to identify such compromised devices and prevent the transmission of HDCP Content.

By design, the HDCP protocol couples a single transmitter to a single receiver. However, the specification also defines a repeater function, to allow configurations such as that depicted below:

HDCP

Each HDCP link is separate, with a unique transmitter/receiver pair which encrypts data in a unique way, as determined by the keys for a particular link. Though separate, the links are not entirely independent. Certain HDCP functions require status and other information about the system as a whole, and the protocol specifies how such information is disseminated system wide.

Each HDCP capable device model has a unique set of keys; there are 40 keys, each 56 bits long. These keys are confidential and failure to keep them secret may be seen as a violation of the license agreement. For each set of keys a special key called a KSV (Key Selection Vector) is created. Each KSV has exactly 20 bits set to 0 and 20 bits set to 1. During the authentication process, both parties exchange their KSVs. Then each device adds (without overflow) its own secret keys according to a KSV received from another device. If a particular bit in the vector is set to 1, then the corresponding secret key is used in the addition, otherwise it is ignored. Keys and KSVs are generated in such a way that during this process both devices get the same 56 bit number as a result. That number is later used in the encryption process.

HDCP is licensed by Digital Content Protection, LLC, a subsidiary of Intel. In addition to paying fees, licensees agree to limit the capabilities of their products. For example, High-definition digital video content must be restricted to DVD quality on non-HDCP compliant video outputs when requested by the source. DVD-Audio content is restricted to DAT quality on non-HDCP digital audio outputs (analogue audio outputs have no quality limits). Licensees cannot allow their devices to make copies of content, and must design their products to effectively frustrate attempts to defeat the content protection requirements.

  • How Do Computers Make Pictures?
  • Graphic Card Resolution
  • Graphic Card Colour Depth
  • Graphic Card Components
  • Graphic Card Memory
  • Graphic Card Driver Software
  • 3d Accelerated Graphic Cards
  • Graphic Card Geometry
  • 3D Rendering
  • FSAA Graphic Card Technology
  • Digital Graphic Cards
  • DVI Graphic Cards
  • HDCP Technology
  • Graphic Card HDMI Ports
  • Graphic Card Display Port
  • Unified Display Special Interest Group
  • DirectX
  • OpenGL technology
  • Direct3D
  • Talisman
  • Fahrenheit Graphic Cards
  • SLI Technology
  • CrossFire Graphic Cards

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Graphics Cards

Latest Articles

Windows Custom Safety

Windows Custom Safety Windows Custom Safety is another delightful fake Safety client infection. The idea behind infections of this nature is to trick the user into purchasing the software to remove the fake infections it purports to have found. It does this by making it difficult for users to run … [Read More...]

Keep Track of Product Serial Numbers

It's always a good idea to document serial numbers of the high priced gadgets in your home or business. If your place burns down, gets damaged in a storm or is broken into, having that information is useful. It is good for many reasons. It can help for tax purposes if you have equipment you need to … [Read More...]

Hard Disk MicroDrives

GMR technology was a key feature of IBM's (the company's hard disk drive business was subsequently acquired by Hitachi Global Storage Technologies in 2002) revolutionary Microdrive device, launched in mid-1999. The world’s smallest, lightest one-inch hard drive was invented at … [Read More...]

Artificial Intelligence is Shaping the Solar Energy Field

The global market for solar power is expected to be worth $194.75 billion by 2027. As demand for solar energy solutions rises, solar product … [Read More...]

9 More Great Microsoft Word Hacks to Boost Productivity

We mentioned a few great Microsoft Word hacks in our last post. We wanted to follow up and share some more that can help improve productivity. … [Read More...]

7 Great Microsoft Word Hacks to Bolster Productivity

Today we are going to show you 24 Word tricks to get the most out of this text editor. Although there are many alternatives, Word is still the tool … [Read More...]

The Growing Importance of AI in Forestry Preservation

Artificial Intelligence as a key to environmental and forest industry preservation There are different types of Artificial Intelligence. On the one … [Read More...]

Machine Learning: the Future of the Hotel Industry

Do you operate a hotel chain and want to calculate budgets automatically? Does your hotel need to predict next week's purchase orders or how many … [Read More...]

5 Pieces of Technology to Boost Your Business in 2021

Let’s face it; running a business is not usually easy. Whether you are self-employed and running your own one-person operation or employing many … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

CD-ROM XA

As a separate extension to the Yellow Book introduced in 1988 by Philips, Sony and Microsoft, the CD-ROM XA specification comprises the … [Read More...]

Remove Antivirus Action

Antivirus Action is a notorious rouge anti-spyware program that can pose serious threat to your system if it gets access to it and is not dealt … [Read More...]

Meeting the Agricultural Challenges of The Future with IoT

The Internet of Things is changing the future of many industries. One of the industries that will be most affected by the IoT is agriculture. It … [Read More...]

[footer_backtotop]

Copyright © 2021 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors